Cybersecurity
-
Chief Privacy Officer Martha Wewer reviewed the state’s approach to data protection, AI oversight and consumer privacy on Thursday as Gov. Josh Stein marked a new day of awareness during Data Privacy Week.
-
There was a record set for data breaches in 2025, and the incidents were also paired with fewer details in notification letters, raising concerns about transparency and public understanding.
-
Following a turbulent year in cybersecurity, the state Governor’s Technology Office is seeking to hire a new cybersecurity lead to manage risk and compliance. Nevada’s permanent CISO retired in May 2025.
More Stories
-
If we are to proactively defend our cybersecurity, we must move away from historical algorithm audit and analysis to real-time pattern recognition audit and analysis.
-
Every day, the state stops about 730,000 attacks on its IT network, ranging from spam and phishing e-mails to malicious bots designed to slow or shut a computer network down.
-
County computer experts have concluded that the virus originated from an attachment that an employee received and spread.
-
In the age of the data breach, here are questions internal auditors and compliance managers must ask regarding third-party access.
-
Because of legal loopholes, consumers often lack any right to control how long their data is kept, who it is shared with and what is collected about them.
-
State senate leaders are pushing for legislation that requires companies to encrypt data if they want to do business with Connecticut agencies.
-
Members of the committee began meeting in secret last year to discuss concerns about the security of their emails and whether county Executive Rich Fitzgerald's office had snooped on documents.
-
Demanding personal passwords could violate students' free-speech rights, as well as their Fourth Amendment protection from unlawful searches and seizures, according to critics.
-
Secretaries of the Defense Department, National Security Agency and Cyber Command have warned of the potential for a cyber 9/11 or online Pearl Harbor.
-
While it's an issue that cuts across the usual partisan battle lines, the coalition of legislators still faces an uphill battle to bring their "data privacy" amendment to a popular vote next year.
-
Much of the security of our personal data depends on businesses implementing proper protocols to protect databases. But government can’t rely on market incentives alone to compel the best data security practices.
-
The White House Summit on Cybersecurity and Consumer Protection highlighted the state of increasing cyber threats and news of cooperation that spans sectors in the form of an information-sharing order.
-
Policymakers suggest minimum cybersecurity requirements for Defense Department contractors, stronger capabilities for identifying hackers, and better deterrents against foreign online attacks.
-
The company said it took the lead on a shared information system because its main business is operating a vast network built upon users sharing their lives with one another, making the creation of ThreatExchange a "natural" fit.
-
In August, Gov. Jerry Brown signed a bill requiring all smartphones sold in California after July 1 to contain kill switches, but technology companies already are moving to meet the requirement nationwide.
-
While technology creates the opportunity to complete tasks quicker and access more information, it also opens the door to an unimaginable number of threats to our lives and businesses.
-
A new office charged with analyzing and integrating cybersecurity threat data collected by regional intelligence agencies aims to do for cybersecurity what the National Counterterrorism Center did for terrorism.
-
Once-complacent businesses, stung by debilitating cyberattacks at Target Corp., JPMorgan Chase Co. and other well-known companies, are on a cyberattack insurance shopping spree., and insurance offices are struggling to keep pace.
Most Read